SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Singh YN, Singh SK. Int. J. Biom. 2013; 5(2): 137.

Copyright

(Copyright © 2013, Inderscience Publishers)

DOI

10.1504/IJBM.2013.052964

PMID

unavailable

Abstract

The interest in biometric technology is received much attention in the recent years. However, the security issue still persists the main challenge for the reliable functioning of biometric-based authentication systems. Much has been reported on the vulnerabilities of biometric systems that breach the security and user privacy. We present a high-level classification of biometric system vulnerabilities and discuss the defence techniques of these vulnerabilities. We present a multidimensional threat environment of the biometric systems that includes faults, failures and security attacks. A framework of biometric security attacks on man-machine model is presented and the system vulnerabilities are represented using Ishikawa's diagram. The provable defence techniques such as biometric vitality detection and biometric template protection are critically evaluated, in particular, a classification of current state-of-the-art of vitality detection techniques of commonly used biometrics is proposed. Our main contributions include: (1) propose a taxonomy of biometric system vulnerabilities; (2) present a framework of biometric security attacks using man-machine model; (3) representation of vulnerabilities using Ishikawa's diagram; (4) an evaluation of defence techniques of these vulnerabilities.

KEYWORDS: biometrics; authentication; vulnerabilities; vitality measures; template protection; security; defences.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print